Deutsch   English   Français   Italiano  
<v4kial$2219$10@i2pn2.org>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder9.news.weretis.net!news.nk.ca!rocksolid2!i2pn2.org!.POSTED!not-for-mail
From: Richard Damon <richard@damon-family.org>
Newsgroups: comp.theory,sci.logic
Subject: Re: H(D,D) cannot even be asked about the behavior of D(D) V3
 ---IGNORING ALL OTHER REPLIES
Date: Sat, 15 Jun 2024 13:17:09 -0400
Organization: i2pn2 (i2pn.org)
Message-ID: <v4kial$2219$10@i2pn2.org>
References: <v45tec$4q15$1@dont-email.me> <v46na7$3ifov$4@i2pn2.org>
 <v48be9$rgsh$1@dont-email.me> <v48gh6$3kcoe$4@i2pn2.org>
 <v48jv2$se9c$1@dont-email.me> <v49dge$3kcoe$5@i2pn2.org>
 <v4a0hs$157ic$3@dont-email.me> <v4ak5o$3kcoe$6@i2pn2.org>
 <v4am8r$19edk$1@dont-email.me> <v4apjs$19rnv$1@dont-email.me>
 <v4arp0$1a7uo$1@dont-email.me> <v4b1c3$3nf9n$3@i2pn2.org>
 <v4b50m$1f89t$5@dont-email.me> <v4c12r$3oop0$3@i2pn2.org>
 <v4cjl7$1o4b4$1@dont-email.me> <v4d991$3qbnc$1@i2pn2.org>
 <v4da12$1sioe$1@dont-email.me> <v4dbmf$3qbnc$3@i2pn2.org>
 <v4dcd6$1sioe$3@dont-email.me> <v4df0h$3qbnd$1@i2pn2.org>
 <v4dhf5$1tsdf$2@dont-email.me> <v4dja1$3qbnd$5@i2pn2.org>
 <v4djhf$1tsdf$6@dont-email.me> <v4dk7b$3qbnc$8@i2pn2.org>
 <v4dl3b$225kb$1@dont-email.me> <v4dn5u$3qbnd$8@i2pn2.org>
 <v4dop4$22o4a$2@dont-email.me> <v4dq07$3qbnc$12@i2pn2.org>
 <v4dqq0$2353n$1@dont-email.me> <v4el9m$3rsd6$3@i2pn2.org>
 <v4f3ec$2akmh$2@dont-email.me> <v4g65a$3tn6q$1@i2pn2.org>
 <v4kh6a$3hugj$4@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 15 Jun 2024 17:17:09 -0000 (UTC)
Injection-Info: i2pn2.org;
	logging-data="67625"; mail-complaints-to="usenet@i2pn2.org";
	posting-account="diqKR1lalukngNWEqoq9/uFtbkm5U+w3w6FQ0yesrXg";
User-Agent: Mozilla Thunderbird
Content-Language: en-US
X-Spam-Checker-Version: SpamAssassin 4.0.0
In-Reply-To: <v4kh6a$3hugj$4@dont-email.me>
Bytes: 5092
Lines: 78

On 6/15/24 12:57 PM, olcott wrote:
> On 6/13/2024 8:24 PM, Richard Damon wrote:
>> On 6/13/24 11:32 AM, olcott wrote:
>>>
>>> It is contingent upon you to show the exact steps of how H computes
>>> the mapping from the x86 machine language finite string input to
>>> H(D,D) using the finite string transformation rules specified by
>>> the semantics of the x86 programming language that reaches the
>>> behavior of the directly executed D(D)
>>>
>>
>> Why? I don't claim it can.
> 
> When I ask you to provide the mapping from the input
> to H(D,D) to each step of the behavior of D(D) and
> and you refuse then within Socratic questioning you
> have proved to not be interested in an honest dialog.

No, by asking a Red Herring question, *YOU* are showing that YOU are not 
interested in Honest Dialog, because you have been backed in to a 
corner. The fact that you keep on trying to redefine terms in strange 
ways just shows that you intend to be deceptive, so you aren't even not 
interested in an Honest Dialog, but you want to engage in deception.

It is YOUR problem to solve, and you are just proving that you can't do 
it and have wasted your life on stuff you can't prove.

> 
> The first six steps of this mapping are when instructions
> at the machine address range of [00000cfc] to [00000d06]
> are simulated/executed.
> 
> What are the remaining steps that prove that the input
> to H(D,D) has the behavior of D(D) ???

THE DEFINITION YOU DUMMY.

Remember, "Inputs" don't have behavior, as they are only "finite string"

BEHAIVOR is what Programs have.

By the definition of a Halting Decider, the decider is to report on the 
behavior of the program the input represents.

SO, H(D,D) is asking about the Program D(D).

Now, if H(D,D) is NOT asking about the behavior of program D(D), then 
you are just admitting that you lied and didn't follow the instructions 
of Linz or Sipser, because in both cases, the high level description of 
what those inputs do, is to ask H on the behaviors of themselves, and 
*YOU* coded that as a call to H(D,D).

SO, either you admit that you have been LYING about building the input 
per the proof, or you are LYING about H(D,D) not asking about the 
behavior of D(D).

Either way, you are just admitting to being an ignorant liar.

> 
> _D()
> [00000cfc](01) 55          push ebp
> [00000cfd](02) 8bec        mov ebp,esp
> [00000cff](03) 8b4508      mov eax,[ebp+08]
> [00000d02](01) 50          push eax       ; push D
> [00000d03](03) 8b4d08      mov ecx,[ebp+08]
> [00000d06](01) 51          push ecx       ; push D
> [00000d07](05) e800feffff  call 00000b0c  ; call H
> [00000d0c](03) 83c408      add esp,+08
> [00000d0f](02) 85c0        test eax,eax
> [00000d11](02) 7404        jz 00000d17
> [00000d13](02) 33c0        xor eax,eax
> [00000d15](02) eb05        jmp 00000d1c
> [00000d17](05) b801000000  mov eax,00000001
> [00000d1c](01) 5d          pop ebp
> [00000d1d](01) c3          ret
> Size in bytes:(0034) [00000d1d]
> 
>